Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe
-
Size
564KB
-
MD5
e699473d34138a5db37ea27a95b4034d
-
SHA1
fa121282afa0a63995f9e5486412c1563e027cde
-
SHA256
1333ffd4d8c9fe04e41029afeab8df1025409d5062c4b59c98b842bc80479864
-
SHA512
afcb96f98d1323d829e4e364a91dab96bbc0d62cbcd98d7a827fb0730b670e5ed8ceb1d5db22005d94a1aba7b0f3ee1da6b6d660f7e0c8e78f6bca7894ed731a
-
SSDEEP
6144:oIqEpZa8JfBfjvfPXPf7fffTPfHffNf/f/RfelmvkQNGfef1HHfP9fXffffvfPf+:xLcrYzIO8jQnjEOqsUsI
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat computecompute.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language computecompute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language computecompute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E873AE7-AAFD-4933-A723-564B0657B038}\WpadNetworkName = "Network 3" computecompute.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 computecompute.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E873AE7-AAFD-4933-A723-564B0657B038} computecompute.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-ca-8c-1d-5e-f7 computecompute.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E873AE7-AAFD-4933-A723-564B0657B038}\WpadDecisionReason = "1" computecompute.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E873AE7-AAFD-4933-A723-564B0657B038}\WpadDecision = "0" computecompute.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E873AE7-AAFD-4933-A723-564B0657B038}\b6-ca-8c-1d-5e-f7 computecompute.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-ca-8c-1d-5e-f7\WpadDecisionTime = 80fb59f0ea08db01 computecompute.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-ca-8c-1d-5e-f7\WpadDetectedUrl computecompute.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings computecompute.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections computecompute.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings computecompute.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" computecompute.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 computecompute.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad computecompute.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 computecompute.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E873AE7-AAFD-4933-A723-564B0657B038}\WpadDecisionTime = 80fb59f0ea08db01 computecompute.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-ca-8c-1d-5e-f7\WpadDecisionReason = "1" computecompute.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-ca-8c-1d-5e-f7\WpadDecision = "0" computecompute.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2236 e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe 2752 e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe 2800 computecompute.exe 2672 computecompute.exe 2672 computecompute.exe 2672 computecompute.exe 2672 computecompute.exe 2672 computecompute.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2752 e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2752 2236 e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2752 2236 e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2752 2236 e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2752 2236 e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe 30 PID 2800 wrote to memory of 2672 2800 computecompute.exe 32 PID 2800 wrote to memory of 2672 2800 computecompute.exe 32 PID 2800 wrote to memory of 2672 2800 computecompute.exe 32 PID 2800 wrote to memory of 2672 2800 computecompute.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e699473d34138a5db37ea27a95b4034d_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2752
-
-
C:\Windows\SysWOW64\computecompute.exe"C:\Windows\SysWOW64\computecompute.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\computecompute.exe"C:\Windows\SysWOW64\computecompute.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2672
-